Sciweavers

5752 search results - page 1051 / 1151
» Informative Labeling Schemes
Sort
View
141
Voted
CASES
2010
ACM
15 years 18 days ago
Real-time unobtrusive program execution trace compression using branch predictor events
Unobtrusive capturing of program execution traces in real-time is crucial in debugging cyber-physical systems. However, tracing even limited program segments is often cost-prohibi...
Vladimir Uzelac, Aleksandar Milenkovic, Martin Bur...
149
Voted
EDBT
2010
ACM
135views Database» more  EDBT 2010»
15 years 17 days ago
Querying spatial patterns
Spatial data are common in many scientific and commercial domains such as geographical information systems and gene/protein expression profiles. Querying for distribution patterns...
Vishwakarma Singh, Arnab Bhattacharya, Ambuj K. Si...
127
Voted
FOCS
2010
IEEE
15 years 17 days ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass
126
Voted
GLOBECOM
2010
IEEE
15 years 17 days ago
Providing Secrecy Irrespective of Eavesdropper's Channel State
A usual concern against physical layer security is that the legitimate parties would need to have (partial) channel state information (CSI) of the eavesdropper in order to design t...
Xiang He, Aylin Yener
127
Voted
GROUP
2010
ACM
15 years 17 days ago
The human factors of consistency maintenance in multiplayer computer games
Consistency maintenance (CM) techniques are a crucial part of many distributed systems, and are particularly important in networked games. In this paper we describe a framework of...
Cheryl Savery, T. C. Nicholas Graham, Carl Gutwin
« Prev « First page 1051 / 1151 Last » Next »